Download presentation
Presentation is loading. Please wait.
Published byColeen McLaughlin Modified over 9 years ago
1
ACM 511 Chapter 2
2
Communication
3
Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over the network. This division of the data stream into smaller pieces is called segmentation. Segmenting messages has two primary benefits. First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process used to interleave the pieces of separate conversations together on the network is called multiplexing. Second, segmentation can increase the reliability of network communications. The separate pieces of each message need not travel the same pathway across the network from source to destination.
4
Communicating the Messages
5
Devices
6
Media
7
Services
8
Hosts In the context of a network, end devices are referred to as hosts. A host device is either the source or destination of a message transmitted over the network. In order to distinguish one host from another, each host on a network is identified by an address. When a host initiates communication, it uses the address of the destination host to specify where the message should be sent. In modern networks, a host can act as a client, a server, or both. Software installed on the host determines which role it plays on the network.
9
Intermediary Devices Networks rely on intermediary devices which connect the individual hosts to the network and can connect multiple individual networks to form an internetwork.Examples of intermediary network devices are: Network Access Devices (Hubs, switches, and wireless access points) Internetworking Devices (routers) Communication Servers and Modems Security Devices (firewalls)
10
Intermediary Devices The management of data as it flows through the network is also a role of the intermediary devices. These devices use the destination host address, in conjunction with information about the network interconnections, to determine the path that messages should take through the network. The management of data as it flows through the network is also a role of the intermediary devices. These devices use the destination host address, in conjunction with information about the network interconnections, to determine the path that messages should take through the network. Regenerate and retransmit data signals Maintain information about what pathways exist through the network and internetwork Notify other devices of errors and communication failures Direct data along alternate pathways when there is a link failure Classify and direct messages according to QoS priorities Permit or deny the flow of data, based on security settings
11
Media Copper, fiber, wireless Copper, fiber, wireless Different types of network media have different features and benefits. Not all network media has the same characteristics and is appropriate for the same purpose. Criteria for choosing a network media are: Different types of network media have different features and benefits. Not all network media has the same characteristics and is appropriate for the same purpose. Criteria for choosing a network media are: The distance the media can successfully carry a signal. The environment in which the media is to be installed. The amount of data and the speed at which it must be transmitted. The cost of the media and installation
12
LANs Networks infrastructures can vary greatly in terms of: Networks infrastructures can vary greatly in terms of: The size of the area covered The number of users connected The number and types of services available An individual network usually spans single geographical area, providing services and applications to people within a common organizational structure, such as a single business, campus or region. This type of network is called a Local Area Network (LAN). A LAN is usually administered by a single organization. The administrative control that governs the security and access control policies are enforced on the network level. An individual network usually spans single geographical area, providing services and applications to people within a common organizational structure, such as a single business, campus or region. This type of network is called a Local Area Network (LAN). A LAN is usually administered by a single organization. The administrative control that governs the security and access control policies are enforced on the network level.
13
WANs
14
Internet
15
Terminology Network Interface Card - A NIC, or LAN adapter, provides the physical connection to the network at the PC or other host device. The media connecting the PC to the networking device plugs directly into the NIC. Physical Port - A connector or outlet on a networking device where the media is connected to a host or other networking device. Interface - Specialized ports on an internetworking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to network interfaces.
16
Tracert
17
Network Protocols Networking protocol suites describe processes such as: Networking protocol suites describe processes such as: The format or structure of the message The method by which networking devices share information about pathways with other networks How and when error and system messages are passed between devices The setup and termination of data transfer sessions Term: proprietary, Institute of Electrical and Electronics Engineers (IEEE) Term: proprietary, Institute of Electrical and Electronics Engineers (IEEE)
18
Network Protocols
22
Protocols Network access protocols describe two primary functions, data link management and the physical transmission of data on the media. Network access protocols describe two primary functions, data link management and the physical transmission of data on the media. Terms: encapsulation, segments Terms: encapsulation, segments
23
Protocols Protocols generally do not describe how to accomplish a particular function. By describing only what functions are required of a particular communication rule but not how they are to be carried out, the implementation of a particular protocol can be technology-independent. Looking at the web server example, HTTP does not specify what programming language is used to create the browser, which web server software should be used to serve the web pages, what operating system the software runs on, or the hardware requirements necessary to display the browser. It also does not describe how the server should detect errors, although it does describe what the server should do if an error occurs.
24
Layered Model There are benefits to using a layered model to describe network protocols and operations. Using a layered model: There are benefits to using a layered model to describe network protocols and operations. Using a layered model: Assists in protocol design, because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below. Fosters competition because products from different vendors can work together. Prevents technology or capability changes in one layer from affecting other layers above and below. Provides a common language to describe networking functions and capabilities. term: PDU (Protocol Data Unit) term: PDU (Protocol Data Unit)
25
Models
26
TCP/IP
27
Transfer of Messages
28
Encapsulation
29
Encapsulation
30
Layers
31
Layers
32
Layers
33
Layers Acknowledgement, error recovery, sequencing. The TCP/IP protocols Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) provide the necessary functionality.
34
Layers
35
Layers
36
Layers
37
Addressing
38
MAC Address The Layer 2 address is unique on the local network and represents the address of the end device on the physical media. In a LAN using Ethernet, this address is called the Media Access Control (MAC) address. When two end devices communicate on the local Ethernet network, the frames that are exchanged between them contain the destination and source MAC addresses. The Layer 2 address is unique on the local network and represents the address of the end device on the physical media. In a LAN using Ethernet, this address is called the Media Access Control (MAC) address. When two end devices communicate on the local Ethernet network, the frames that are exchanged between them contain the destination and source MAC addresses.
39
Network Layer PDU
40
Transport Layer
41
Terminology Straight-through Cable: Unshielded twisted pair (UTP) copper cable for connecting dissimilar networking devices Crossover Cable: UTP copper cable for connecting similar networking devices Serial Cable: Copper cable typical of wide area connections Ethernet: Dominant local area network technology MAC Address: Ethernet Layer 2, physical address IP Address: Layer 3 logical address Subnet Mask: Required to interpret the IP address
42
Terminology Default Gateway: The IP address on a router interface to which a network sends traffic leaving the local network NIC: Network Interface Card, the port or interface that allows an end device to participate in a network Port (hardware): An interface that allows a networking device to participate in network and to be connected via networking media Port (software): Layer 4 protocol address in the TCP/IP suite
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.